跳到主要內容

臺灣博碩士論文加值系統

(3.237.6.124) 您好!臺灣時間:2021/07/24 04:36
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:吳旻翰
研究生(外文):Min-Han Wu
論文名稱:探討不同行動支付身分認證機制之可行性
論文名稱(外文):Evaluation of Mobile Payment Authentication Mechanisms
指導教授:許瑋元許瑋元引用關係
口試委員:張欣綠孔令傑
口試日期:2015-06-18
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊管理學研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2015
畢業學年度:103
語文別:中文
論文頁數:81
中文關鍵詞:行動支付身分認證創新擴散理論
外文關鍵詞:mobile paymentauthenticationinnovation diffusion theory
相關次數:
  • 被引用被引用:5
  • 點閱點閱:363
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:2
本研究欲探討不同行動身分認證機制在臺灣應用之可行性。由於行動支付不論是概念的推廣或是服務的普及在臺灣都還算是剛起步的創新階段,因此理論基礎採用創新擴散理論,並透過質性研究的訪談方法,以α銀行與使用者做為研究對象,了解兩個族群的對於密碼辨識、裝置辨識及生物辨識三種不同身分認證機制的認知與看法。
過去對於行動支付資訊安全的相關研究大多數都是透過主觀安全(使用者所認知的安全程度)來討論,較少由客觀安全(明確而具體的技術特性)來進行。此外,過往文獻也少有針對身分認證機制來進行可行性分析。因此本研究透過身分認證機制的技術特性,來了解使用者對於行動支付的資訊安全認知程度。即藉由客觀安全的角度做為出發點,對主觀安全進行討論。
研究結果發現,以銀行的角度來看,密碼辨識是目前最可行的方式,但在裝置普及率夠高的情況下,裝置辨識的服務應用會逐漸推出。生物辨識則是受限於技術成熟度及特徵資料蒐集的問題,目前可行性並不高。然而使用者對於身分認證機制的採用意願最高的是生物辨識,其次是裝置辨識,最後才是密碼辨識。此外,本研究也發現安全性、便利性是使用者相當重要的考慮因素,因此行動支付服務供應商在身分認證機制的選用上,除了提供足夠的安全性,也要顧慮使用者的使用體驗。

The aim of this research is to evaluate the feasibility of different mobile payment authentication mechanisms in Taiwan. Viewing these authentication mechanisms as a form of innovation, this research adopts innovation diffusion theory, and carries out a qualitative case study in a local bank and users in Taiwan. In particular, we focus on the perception of bank managers and potential users about three types of mechanisms, including password, device authentication, and biometric.
Our literature review shows that most prior researches on information security of mobile payment were based on the subjective security, and very few studies evaluate the aspect of objective security. Subjective security is defined as the degree of the perceived security from the viewpoint of the customer, while objective security is a concrete technical characteristic. Additionally, only limited studies were available on the feasibility evaluation of authentication mechanisms. Hence, this research tries to understand the degree of perceived information security of mobile payment of users through the technical characteristic of authentication mechanisms.
The empirical results indicate that in the opinion of α bank, password is the most used mechanism. Because of the limitation of technical maturity and data collection, our findings show that biometric is not feasible at present. However, we found that biometric got the highest users’ intension to adopt authentication mechanisms, second one is device authentication, and password is the last. Moreover, we also noticed that users were quite concerned about safety and convenience. As a result, while choosing authentication mechanisms, mobile payment service providers not only offer adequate safety but also need to consider user experiences.

致謝 i
摘要 ii
Abstract iii
目錄 iv
圖目錄 v
表目錄 v
第一章 導論 1
第一節 研究動機與目的 1
第二節 研究問題 3
第三節 研究架構 4
第二章 文獻回顧 5
第一節 行動支付介紹 5
第二節 行動支付相關議題 9
第三節 行動支付資訊安全相關議題 13
第三章 研究架構 17
第一節 理論背景 17
第二節 身分認證機制之介紹 21
第四章 研究方法 28
第一節 研究設計 28
第二節 研究方法 29
第三節 研究對象 30
第五章 訪談分析 32
第一節 受訪對象描述 32
第二節 使用者對於行動支付身分認證機制的認知與看法 35
第三節 銀行業者對於不同行動支付身分認證機制的看法 53
第六章 結論與建議 65
第一節 結論 65
第二節 研究貢獻與建議 68
第三節 研究限制 69
第四節 後續研究建議 70
參考文獻 73
附 錄 78

AL-ma''aitah, M. and A. Shatat (2011). "Empirical Study in the Security of Electronic Payment Systems." International Journal of Computer Science Issues (IJCSI) 8(4).

Amoroso, D. L. and R. Magnier-Watanabe (2012). "Building a research model for mobile wallet consumer adoption: the case of mobile Suica in Japan." Journal of theoretical and applied electronic commerce research 7(1): 94-110.

Antovski, L. and M. Gusev (2003). M-payments. Information Technology Interfaces, 2003. ITI 2003. Proceedings of the 25th International Conference on, IEEE.

Balan, R. K., N. Ramasubbu, K. Prakobphol, N. Christin and J. Hong (2009). mFerio: the design and evaluation of a peer-to-peer mobile payment system. Proceedings of the 7th international conference on Mobile systems, applications, and services, ACM.

Carr, M. (2007). Mobile payment systems and services: an introduction. Mobile Payment Forum.

Chen, J. J. and C. Adams (2005). User acceptance of mobile payments: a theoretical model for mobile payments. Proceedings of the Fifth International Conference on Electronic Business (ICEB), Hong Kong.

Chen, L.-d. (2008). "A model of consumer acceptance of mobile payment." International Journal of Mobile Communications 6(1): 32-52.

Cheong, J. H., M.-C. Park and J. Hwang (2004). Mobile payment adoption in Korea: Switching from credit card. ITS 15th Biennial Conference, Berlin, Germany, September.

Chou, Y., C. Lee and J. Chung (2004). "Understanding m-commerce payment systems through the analytic hierarchy process." Journal of Business Research 57(12): 1423-1430.
Dahlberg, T., N. Mallat, J. Ondrus and A. Zmijewska (2008). "Past, present and future of mobile payments research: A literature review." Electronic Commerce Research and Applications 7(2): 165-181.

Dai, W., S. Zhou, G. Luo, Z. Chen and L. Xie (2011). "Analyze on Mobile Payment Based on RFID." Procedia Environmental Sciences 10: 950-955.

Dewan, S. G. and L.-d. Chen (2005). "Mobile payment adoption in the USA: a cross-industry, cross-platform solution." Journal of Information Privacy & Security 1(2): 4-28.

Fortunati, L. and S. Taipale (2012). "Organization of the social sphere and typology of the residential setting in Europe: How sociability affects the adoption of the mobile phone in rural and urban locations."

Garside, J. (2012). PayPal case doubt on Near Field mobile payments systems. TheGuardian: Technology, 28th February 2012. Retrieved 5th April 2012

Gerpott, T. J. and K. Kornmeier (2009). "Determinants of customer acceptance of mobile payment systems." International Journal of Electronic Finance 3(1): 1-30.

Goeke, L. and K. Pousttchi (2010). A scenario-based analysis of mobile payment acceptance. Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR), 2010 Ninth International Conference on, IEEE.

Horn, G. and B. Preneel (1998). Authentication and payment in future mobile systems. Computer Security—ESORICS 98, Springer: 277-293.

Hu, W. C., C.-W. Lee and W. Kou (2005). Advances in security and payment methods for mobile commerce, IGI Global.

Humphrey, D. B., M. Kim and B. Vale (2001). "Realizing the gains from electronic payments: costs, pricing, and payment choice." Journal of Money, Credit and Banking: 216-234.


Humphrey, D. B., L. B. Pulley and J. M. Vesala (1996). "Cash, paper, and electronic payments: a cross-country analysis." Journal of Money, Credit and Banking: 914-939.

Kadhiwal, S. and A. U. S. Zulfiquar (2007). "Analysis of mobile payment security measures and different standards." Computer Fraud & Security 2007(6): 12-16.

Karnouskos, S. (2004). "Mobile payment: a journey through existing procedures and standardization initiatives." Communications Surveys & Tutorials, IEEE 6(4): 44-66.

Kieser, M. (2001). "Mobile Payment–Vergleich elektronischer Zahlungssysteme." HMD–Praxis für Wirtschaftsinformatik(220): 27-36.

Kim, C., M. Mirusmonov and I. Lee (2010). "An empirical examination of factors influencing the intention to use mobile payment." Computers in Human Behavior 26(3): 310-322.

Kreyer, N., K. Pousttchi and K. Turowski (2002). Standardized payment procedures as key enabling factor for mobile commerce. E-Commerce and Web Technologies, Springer: 400-409.

Kungpisdan, S., B. Srinivasan and P. D. Le (2004). A secure account-based mobile payment protocol. Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on, IEEE.

Li, T., E. van Heck and P. Vervest (2009). "Information capability and value creation strategy: advancing revenue management through mobile ticketing technologies." European Journal of Information Systems 18(1): 38-51.

Linck, K., K. Pousttchi and D. G. Wiedemann (2006). "Security issues in mobile payment from the customer viewpoint."

Liu, J., J. Liao and X. Zhu (2005). A system model and protocol for mobile payment. e-Business Engineering, 2005. ICEBE 2005. IEEE International Conference on, IEEE.

Lu, Y., S. Yang, P. Y. Chau and Y. Cao (2011). "Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective." Information & Management 48(8): 393-403.

Mallat, N. (2007). "Exploring consumer adoption of mobile payments–A qualitative study." The Journal of Strategic Information Systems 16(4): 413-432.

Mallat, N., M. Rossi, V. K. Tuunainen and A. Öörni (2009). "The impact of use context on mobile services acceptance: The case of mobile ticketing." Information & Management 46(3): 190-195.

Me, G. (2003). Payment security in mobile environment. Computer Systems and Applications, 2003. Book of Abstracts. ACS/IEEE International Conference on, IEEE.

Milberg, S. J., S. J. Burke, H. J. Smith and E. A. Kallman (1995). "Values, personal information privacy, and regulatory approaches." Communications of the ACM 38(12): 65-74.

Ofcom (2012). Communications Market Report 2012: UK, 18th July 2012. Retrieved 24th July 2012

Ondrus, J. and K. Lyytinen (2011). Mobile Payments Market: Towards Another Clash of the Titans? Mobile Business (ICMB), 2011 Tenth International Conference on, IEEE.

Ondrus, J., K. Lyytinen and Y. Pigneur (2009). Why mobile payments fail? Towards a dynamic and multi-perspective explanation. System Sciences, 2009. HICSS''09. 42nd Hawaii International Conference on, IEEE.

Ondrus, J. and Y. Pigneur (2007). "Cross‐industry Preferences for Development of Mobile Payments in Switzerland." Electronic Markets 17(2): 142-152.
Patton, M. Q. (1995). Qualitative evaluation and research methods, (質的評鑑與研究,吳芝儀、李奉儒譯)。臺北市:桂冠.

Pousttchi, K. and D. G. Wiedemann (2007). "What Influences Consumers’ Intention to Use Mobile Payments." LA Global Mobility Round table.

Pousttchi, K. and M. Zenker (2003). Current mobile payment procedures on the german market from the view of customer requirements. Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on, IEEE.

Rogers Everett, M. (1995). "Diffusion of innovations." New York.

Slade, E. L., M. D. Williams and Y. K. Dwivedi (2013). "Mobile payment adoption: Classification and review of the extant literature." The Marketing Review 13(2): 167-190.

Varshney, U. (2002). "Mobile payments." Computer 35(12): 120-121.

Yang, S., Y. Lu, S. Gupta, Y. Cao and R. Zhang (2012). "Mobile payment services adoption across time: An empirical study of the effects of behavioral beliefs, social influences, and personal traits." Computers in Human Behavior 28(1): 129-142.

林金定, 嚴嘉楓 and 陳美花 (2005). "質性研究方法: 訪談模式與實施步驟分析." 身心障礙研究季刊 3(2): 122-136.

陳向明 (2002). 社會科學質的硏究, 五南圖書出版股份有限公司.

萬文隆 (2004). "深度訪談在質性研究中的應用." 生活科技教育月刊 37(4): 17-23.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 林天祐(1996)。認識研究倫理。教育資料與研究,12。57-63。
2. 林天祐(1996)。認識研究倫理。教育資料與研究,12。57-63。
3. 于富雲(2001)。從理論基礎探究合作學習的教學效益。教育資料與研究,38,22-28。
4. 于富雲(2001)。從理論基礎探究合作學習的教學效益。教育資料與研究,38,22-28。
5. 胡潔芳( 1999 )。如何協助孩童發展英語音韻覺識。英語教學,23(3),(7-21)。
6. 胡潔芳( 1999 )。如何協助孩童發展英語音韻覺識。英語教學,23(3),(7-21)。
7. 王千倖〈1997〉。讓合作學習增進班級的向心力。國民教育,38(1),49-53。
8. 王千倖〈1997〉。讓合作學習增進班級的向心力。國民教育,38(1),49-53。
9. 李振清( 1981 ):談英語發音教學應有的基本概念。英語教學,5(4),14-21頁。
10. 李振清( 1981 ):談英語發音教學應有的基本概念。英語教學,5(4),14-21頁。
11. 洪富峰(1997)。地理觀察與解釋。環境與世界,11,41-58。
12. 洪富峰(1997)。地理觀察與解釋。環境與世界,11,41-58。
13. 張新仁(2014)。分組合作學習-改變課堂教學生態的希望工程。師友月刊,559,
14. 張新仁(2014)。分組合作學習-改變課堂教學生態的希望工程。師友月刊,559,
15. 黃詠仁、王美芬(2002)。國小自然科合作學習教學策略之行動研究。科學教育研究與發展季刊,28,1-19。
 
無相關點閱論文